The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Trust plays an important role in software usage. It helps users overcome perceptions of uncertainty and risk and engages in trust behaviors. In this position paper, we propose using the trust behavior as a main characteristic to provide software recommendations. We explore a model of trust behavior that contains three root constructs: using behavior, reflection behavior and correlation behavior. The...
Wireless medium is more prone to security breaches than wired medium. The issue of security becomes critical in Mobile ad-hoc networks (MANets), due to the mobility of nodes. Node mobility causes frequent change in the radio transmission range thus changing the group membership. Members in a group communicate using the group key. Each time the group change, a new group key is to be computed in a secured...
Inspired by recent empirical research on link communities, we borrow some important ideas and concepts for our own research to provide a more reasonable computation model of transitive trust. The key advantages of using link community methodology is to reflect on the nature of the social network features of Hierarchy and Overlap. Our research mainly resolves the computation of trust transitivity in...
With the growing popularity of wireless mobile ad hoc networks(MANETs), many security concerns have arisen from MANETs especially the misbehaving nodes pose a major threat. Node misbehaviour in ad hoc network is caused by lack of cooperation and goes under the name node selfishness. A selfish node does not directly intent to damage other nodes with active attacks but it simply does not cooperate in...
Mobile Business has extensive application prospects, and consumer participation is the key to the development of mobile business. In this paper, a model of factors affecting trust in mobile commerce is proposed. Through questionnaires and collected 310 valid questionnaires were carried out using SEM Analysis. Study confirms our model.
Trust is the key factor for the sustainable development of whether e-commerce or m-commerce. Since the research on the trust of business-to-consumer m-commerce is a lack at present, this study analyzes concepts and characters of the trust of B2C m-commerce at first. Then it discusses the impact factors from the perspective of trading parties and environment. Finally a hierarchical model for the trust...
This paper investigates the factors that influencing the adoption of ubiquitous commerce (u-commerce) focusing on users' trust in privacy and security. Specifically, a framework is developed to show the interrelationships among users' trust, privacy and security on the adoption of u-commerce. The precedent factors that affecting privacy and security are also analyzed, including technology familiarity,...
Communication in Mobile Ad-Hoc Network (MANET) is based on mutual trust between the participating nodes. Due to features of open medium, dynamic changing topology, lack of centralized monitoring and management, MANETs are vulnerable to various security attacks. Hence, finding a secure and trustworthy end-to-end path in MANET is a real challenge. The paper presents a solution for trustworthy path discovery...
Although the mobile shopping is convenient for our daily life, some people still discontinue their usage of mobile shopping approach even they already have the experience. The purpose of this study is to understand the factors of mobile shopping continuance. With the survey method, 500 college students of mobile phone users were surveyed and 244 effective questionnaires were obtained for survey analysis...
Routing in mobile ad-hoc networks is a challenging task. This paper proposes MPG-TAR, trust-aware routing protocol based on the formation of trusted Mobile Process groups(MPG). MPG is a collection of processes or mobile nodes present in defined vicinity where they all lie within each other's radio transmission range. The trusted MPG groups formed in MPGTAR calculate trust based on the mobility rate,...
Applying current existing trust models or trust management systems on mobile computing environments require extracting user's trust standards in different contexts, user's experience or feedback dissemination and user's decision about trust or distrust. However mobility, uncertainty and heterogeneity of mobile computing environments make trust management much more complicated, so they are inadequate...
The inherent freedom in self-organized mobile ad-hoc networks (MANETs) introduces challenges for trust management; particularly when nodes do not have any prior knowledge of each other. Furthermore in MANETs, the nodes themselves should be responsible for their own security. We propose a novel approach for trust management in MANETs that is based on the nodes' own responsibility of building their...
For unpredictable manner of mobile ad hoc network (manet), due to mobility of nodes in network, the shortest path is not necessarily the better path. If we do not consider the stability of routing path, then wireless links may be easily broken. Hence it is important to find a route that endures a longer time. Recently, efforts in this field have dealt the parameters battery power or trust of a node...
Due to the rapid development of mobile computing technology and social network service, mobile social network emerges as a new network paradigm, which significantly facilitates the communication and resource sharing between mobile clients/users that are socially interconnected. However, the functionality and security of such networks would be potentially undermined without an effective trust management...
In the last decades, Digital Rights Management (DRM) technology has been laid emphasis on digital contents protection and related security policies, mechanisms and implementation. In order to effectively protect digital assets with copyrights?? against piracy and misuse, it is necessary for the contents value chain as a whole to investigate on some open issues and advances. The paper proposed three...
Using a mobile application to report an emergency allows for the transmission of the current location. This not only helps rescue teams but supports the assistance service if provided by insurance companies. However, the acceptance behavior as well as the influence of trust related to the insurer is unknown. We hence explore the influence of provider trust on the acceptance of mobile emergency applications...
Due to the widespread development of mobile internet, more and more users will transfer to mobile virtual community from web community. This study attempts to understand factors affecting the adoption of mobile virtual community in addition to those affecting other mobile services. An adoption model that reflects the characteristics of mobile virtual community is developed. The model consists of the...
This paper presents a mobile services acceptance model, which includes aspects of trust, contextual fit, and personal initiatives and characteristics in addition to perceived usefulness and perceived ease of use from the technology acceptance model (TAM). The proposed research model was empirically tested using data collected from a survey of 25 users of a mobile service called Mobile Student Information...
3G is the primary trend of mobile service in the future, users face a tradeoff between personalization and privacy in the 3G adoption process. The extended valence framework can be used in this paper to explain that how this tradeoff influence user's usage intention of 3G service.
Services have become increasingly important in today's Web-based applications. Users can access services in an anytime, anywhere manner using a wide variety of mobile devices. Mobile services are a key driver in today's telecommunication market, even though the potential of mobile services has not been fully exploited in existing telecommunication systems. A main driver in these markets are context-...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.